Home » admin


I have been working with Linux based systems since 2002. I hope the article published on this site will be useful to those new to server administration.

PHPMyAdmin – Unable to establish a PHP session

PHPMyAdmin error Have you ever come across the following error when you access PHPMyAdmin from cPanel. Access Denied Unable to establish a PHP session. If you believe that this is in error or inadvertent, contact your system administrator and ask them to review your server settings. Normally, you will get this error when the permission or ownership of the tmp folder …

Read More »

6 Linux Crontab Command Examples

Crontab command manages the cron table that is used by the cron daemon to execute the cron jobs. This article explains the various command line options of the crontab command.   1. Tweaking Other Users Crontab using Option -u -u stands for user. This should be followed by a valid username in the system. -u option alone doesn’t do anything. …

Read More »

HowTo: Flush Contents Of a Memcached Server Using Command Line

I’ve installed memcached server under Linux but it is still showing old data. How do I flush the contents of a Memcached instance / server? You can invalidate all existing cache items using the flush_all command. This command does not pause the server, as it returns immediately. It does not free up or flush memory at all, it just causes …

Read More »

How to turn Off linux password expiration?

Question : How to turn off password expiration under Linux?   Answer: The  Encrypted password list is stored  in /etc/shadow file cat /etc/shadow   root:$1$dkk&Iw6zvgu$P3ms0o5GiXv66BzNXe0:15294:0:99999:7:: This is the explanation of the above line {userName}:{password}:{lastpasswdchanged}:{Minimum_days}:{Maximum_days}:{Warn}:{Inactive}:{Expire}: Under Linux, to turn off the password expiration  we  use a  tool   called “chage” you  can  download it via yum  or  apt-get package  managers  tools. For Debian based …

Read More »

Install Rkhunter

Overview rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online database, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux and FreeBSD. Instructions 1. Log into your …

Read More »

How To Use the grep Command in Linux

How do I use grep command in Linux operating systems? Can you give me a simple example of grep command? The grep command searches the given file for lines containing a match to the given strings or words. By default, grep displays the matching lines. Use grep to search for lines of text that match one or many regular expressions, …

Read More »

How to find out the spam mailing script’s location – Exim

The Exim mail server has a lot of options/commands to find out the details of spammers easily from the command line. We can find out the mail queue details, spam mail sender details, spam mail counts etc from the link I mentioned above. Here is a script/piped-command to find out the spam mailing script’s location/folder in the server. It would …

Read More »